<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>laptops Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/laptops/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/laptops/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Wed, 15 May 2024 20:55:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>laptops Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/laptops/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Protecting Your Financial Interests in the Wake of a Major Data Breach</title>
		<link>https://fosterinstitute.com/protecting-your-financial-interests-in-the-wake-of-a-major-data-breach/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sun, 21 Apr 2024 13:33:01 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Anti-virus]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Credit Freeze]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Fraud]]></category>
		<category><![CDATA[Cyber Scams]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Restoration]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Identity Theft]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[Malicious Advertising]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Restoring]]></category>
		<category><![CDATA[Security Breach]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5779</guid>

					<description><![CDATA[<p>In today&#8217;s digital age, the security of your personal information is more than a convenience &#8211; it&#8217;s a crucial aspect of your financial strategy. Recently, a significant breach at a major phone provider has put the personal data of 73 million individuals at risk, including high-net-worth individuals like yourself. This exposed data includes not only [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/protecting-your-financial-interests-in-the-wake-of-a-major-data-breach/">Protecting Your Financial Interests in the Wake of a Major Data Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s digital age, the security of your personal information is more than a convenience &#8211; it&#8217;s a crucial aspect of your financial strategy. Recently, a significant breach at a major phone provider has put the personal data of 73 million individuals at risk, including high-net-worth individuals like yourself. This exposed data includes not only names and contact details but also sensitive information such as social security numbers, dates of birth, and account credentials. The potential financial repercussions are substantial, making it imperative to take action to safeguard your assets. Follow these guidelines to mitigate risks and ensure your financial security remains uncompromised.</p>
<h3>Credit Freeze</h3>
<p>If you haven’t already, consider freezing your credit to prevent new credit accounts from being opened in your name without your permission. Here are in-depth instructions and details: <a href="https://fosterinstitute.com/help-protect-your-financial-future-freeze-your-credit/" target="_blank" rel="noopener">Help Protect Your Financial Future: Freeze Your Credit &#8211; Foster Institute</a></p>
<h3>Monitor Financial Accounts</h3>
<p>Keep a close watch on your financial accounts for any unauthorized activity or transactions. Consider subscribing to an identity theft protection service, which can help monitor your information and alert you to potential misuse of your personal data. If you didn’t place the credit freeze mentioned above, doing so is essential.</p>
<h3>Beware of Fraud and Scams</h3>
<p>Beware of email, text, phone calls, or messages popping up on your computer that claim you are hacked and offer tech support help. Familiarize yourself and your family with the latest fraud techniques. Be skeptical of emails, phone calls, or messages that request personal information or direct you to websites asking for personal or financial data.</p>
<h3>Be Cautious with Search Engine Results that are Ads</h3>
<p>Threat actors can purchase ads so that, if you search for keywords such as &#8216;My phone provider database was hacked,&#8217; the ad, disguised as a helpful search result, will appear at the top. This can lead you to a page designed to defraud you or compromise your computer</p>
<p>To help protect yourself, when you search, scroll down and click on the organic search results rather than the ads. You are more likely to access safer websites.</p>
<p>Malicious advertising is not limited to search engines. Advertisements on websites can be just as dangerous. These attacks are called malvertising and trick millions of users each year.</p>
<h3>Change Passwords Immediately</h3>
<p>If you haven’t recently, change passwords for all your accounts including phone provider, social media, banking, and other sensitive accounts, especially if you’ve used the same password for multiple accounts.</p>
<h3>Use a Password Manager</h3>
<p>Consider using a password manager to manage your unique passwords on every website. Detailed information about using password managers: <a href="https://fosterinstitute.com/password-managers-speed-your-workflow/" target="_blank" rel="noopener">Password Managers Speed Your Workflow &#8211; Foster Institute</a></p>
<h3>Set Up Unique Security Questions</h3>
<p>When setting up security questions, avoid real answers that are easy for a bad actor to research. Instead, use fictional answers like, “The fourth crater on the moon.” Save your secret answers in a randomly named file such as “socks.docx,” and consider encrypting this file for added safety.</p>
<h3>Enable Two-Step Verification</h3>
<p>Enable two-step verification for accounts. Prioritize setting this up on sensitive websites and services where it&#8217;s available.</p>
<h3>Update Operating Systems and Software</h3>
<p>Ensure that all your devices have the latest security software, web browsers, and operating systems updates and patches. This is one of the best defenses against viruses, malware, and other online threats.</p>
<h3>Secure Your Tax Identity with an ID.me Account</h3>
<p>Given that social security numbers were compromised, there&#8217;s an elevated risk of someone attempting to file a fraudulent federal tax return in your name. To combat this, consider registering for an ID.me account which provides access to IRS services. With this account, you can also apply for an IRS Identity Protection PIN (IP PIN) that adds an extra layer of security to your tax filings by requiring this unique six-digit number on your tax return.</p>
<h3>Protect Your Property Records</h3>
<p>With personal details like your SSN in the wrong hands, even your home ownership documents could be targeted. It&#8217;s advisable to monitor and possibly register your property deeds with services that alert you to any unauthorized filings or changes. While a universal solution for this isn&#8217;t available yet, taking initial steps such as contacting your local county clerk&#8217;s office to inquire about protective measures can be beneficial.</p>
<h3>Awareness for Business Impact</h3>
<p>Businesses, particularly those utilizing services from the breached provider, should be acutely aware of the implications this breach can have on their operations. It&#8217;s crucial for business owners to assess their exposure and strengthen their internal security measures, including employee training on data privacy and regular security audits to prevent further damage.</p>
<h3>Register for Online Tax Accounts in All States</h3>
<p>To prevent the misuse of your personal information for fraudulent state tax filings, consider registering for an online tax account in each of the 50 states. This pre-emptive registration can block identity thieves from creating accounts in your name, a tactic increasingly used to commit tax fraud across state lines.</p>
<h3>Digital Footprint and Data Sharing</h3>
<p>Be vigilant about the information you share online and through mobile applications. It&#8217;s crucial to minimize data sharing and scrutinize the permissions you grant to apps, especially those that request access to sensitive personal information. Educate yourself and limit exposures to safeguard against unauthorized data usage. The less information threat actors can gather about you, the more difficult it will be for them to misuse your identity.</p>
<h3>Review and Update Privacy Settings</h3>
<p>Regularly review and update your privacy settings on social media and other online platforms to ensure minimal public exposure of personal information. This proactive measure can significantly deter fraudsters from using accessible data to facilitate identity theft or scams.</p>
<h3>Legal and Financial Consultation</h3>
<p>Consult with legal and financial advisors to explore additional protective measures tailored to your personal or business circumstances. Discuss setting up legal structures such as trusts to shield assets, or other strategies that may offer enhanced security against identity theft and financial fraud.</p>
<h3>Emergency Contacts and Protocols</h3>
<p>Prepare an emergency contact list and establish protocols for immediate action if you suspect identity theft or if a data breach occurs. Include the contact information for essential services such as credit bureaus, your bank, and legal advisers, to ensure a swift and organized response to security threats.</p>
<p>Forward this message to your friends so they can follow these steps can help mitigate the damage from the breach and protect their personal information.</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6>Disclaimer: The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</h6>
<p>The post <a href="https://fosterinstitute.com/protecting-your-financial-interests-in-the-wake-of-a-major-data-breach/">Protecting Your Financial Interests in the Wake of a Major Data Breach</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Leadership in the Line of Fire: Cleanup or Clean Slate?</title>
		<link>https://fosterinstitute.com/cleanup-or-clean-slate/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 12 Apr 2024 23:01:04 +0000</pubDate>
				<category><![CDATA[Anti-virus]]></category>
		<category><![CDATA[Backup]]></category>
		<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Restoration]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Restoring]]></category>
		<category><![CDATA[Security Breach]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5768</guid>

					<description><![CDATA[<p>The post <a href="https://fosterinstitute.com/cleanup-or-clean-slate/">Leadership in the Line of Fire: Cleanup or Clean Slate?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>The debate between cleaning up an infected computer using security tools versus wiping the system and reinstalling everything from scratch is a longstanding one in the field of cybersecurity. Both approaches have their pros and cons, and the best choice often depends on the specific circumstances and the security policies of the organization. Here&#8217;s a breakdown of each approach:</p>
<h3>Cleaning Up with Security Tools (e.g., Antivirus, EDR, XDR)</h3>
<p><strong>Pros:</strong><br />
&#8211; Faster and more convenient: Cleaning a system with antivirus or EDR/XDR tools is usually quicker than a full reinstall. It allows users to return to work with minimal downtime.<br />
&#8211; Data preservation: This method reduces the risk of losing unsaved data or settings that may not be backed up, though it&#8217;s not foolproof.<br />
&#8211; Immediate response: These tools&#8217; immediate response capabilities help contain and control the spread of malware quickly, reducing further damage.</p>
<p><strong>Cons:</strong><br />
&#8211; Risk of incomplete removal: Some sophisticated malware can hide or embed itself into system files in ways that are difficult for security tools to detect and remove completely.<br />
&#8211; System integrity concern: Even after malware is removed, system settings might be altered in ways that leave vulnerabilities or stability issues. This can compromise the system&#8217;s overall security and functionality, potentially making it less reliable.<br />
&#8211; Potential for reinfection: If the root cause or entry point of the infection isn&#8217;t identified and secured, the system might be reinfected.</p>
<h3>Wiping and Reinstalling</h3>
<p><strong>Pros:</strong><br />
&#8211; System integrity: This approach helps ensure that any malware, including that which might have evaded detection, is completely removed from the system.<br />
&#8211; Clean slate: Reinstalling the operating system and applications can resolve any issues related to software corruption and remove unwanted configurations left by the malware.<br />
&#8211; Opportunity to update and improve: It&#8217;s a good chance to update systems to the latest OS version, apply security patches, and improve configurations for better security.</p>
<p><strong>Cons:</strong><br />
&#8211; Time-consuming: The process can be lengthy, especially if data backup and restoration are involved.<br />
&#8211; Potential data loss: If backups are not recent or complete, there could be a loss of data.<br />
&#8211; Productivity impact: The downtime required to wipe and reinstall a system can impact the user&#8217;s productivity.</p>
<h3>Best Practice Recommendations</h3>
<p>Wiping the system and reinstalling the OS and applications provides more peace of mind that you&#8217;ve removed malware known for its persistence and capability to evade detection. This is essential in high-security environments.</p>
<p>For many organizations, the decision might be based on a risk assessment that considers the nature of the data on the machine, the type of malware, and the criticality of the systems involved. In environments where security is paramount or where compliance requirements dictate stringent responses to security incidents, wiping and reinstalling is often the safer, though more resource-intensive, choice.</p>
<h3>Be Ready to Reinstall</h3>
<p><strong>&#8211; Spare Computers:</strong> Keep spare, ready-to-use, prepared workstations to swap out with a user&#8217;s infected computer so the user doesn&#8217;t lose productivity while your IT team rebuilds their infected machine to become a new, clean spare.<br />
<strong>&#8211; Store Data Elsewhere:</strong> If data files are stored somewhere outside the computer, there&#8217;s no need to back up local data files before erasing the hard drive. If your company has workers who use their laptops offline while traveling, they most likely will have data stored locally. Hopefully, you already have a plan in place to back up their data regularly.<br />
<strong>&#8211; Speedy Reloading:</strong> Use automated installation techniques, such as OS distribution tools or image deployment solutions, to expedite the reloading process and minimize downtime.</p>
<h3>Conclusion</h3>
<p>The uncomfortable reality is that threat actors own all of the tools designed to remove malware from a computer and practice designing their malware to be resilient to the cleaning process. Forgo cleaning tools and completely erase the computer, then reload from scratch to help ensure a higher likelihood that the infection is fully eradicated.</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6>Disclaimer: The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</h6></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://fosterinstitute.com/cleanup-or-clean-slate/">Leadership in the Line of Fire: Cleanup or Clean Slate?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Outsmarting the Invisible Threat: How Cyber Attackers Hijack Your Wi-Fi Connections and How to Protect Yourself</title>
		<link>https://fosterinstitute.com/outsmarting-the-invisible-threat-how-cyber-attackers-hijack-your-wi-fi-connections/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Sat, 23 Mar 2024 20:06:07 +0000</pubDate>
				<category><![CDATA[Airport Safety]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[wi-fi safety]]></category>
		<category><![CDATA[wi-fi security]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5743</guid>

					<description><![CDATA[<p>Wi-Fi is a fundamental part of our digital lives, whether it&#8217;s in your office, favorite coffee shop, or hotel. However, there&#8217;s a hidden peril in this convenience of automatically connecting to networks remembered on your devices. Let’s dive into why this feature, though helpful, can be a gateway for cyber threats. As a chief executive, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/outsmarting-the-invisible-threat-how-cyber-attackers-hijack-your-wi-fi-connections/">Outsmarting the Invisible Threat: How Cyber Attackers Hijack Your Wi-Fi Connections and How to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-preserver-spaces="true">Wi-Fi is a fundamental part of our digital lives, whether it&#8217;s in your office, favorite coffee shop, or hotel. However, there&#8217;s a hidden peril in this convenience of automatically connecting to networks remembered on your devices. Let’s dive into why this feature, though helpful, can be a gateway for cyber threats. As a chief executive, business owner, or top-level executive, you&#8217;re likely familiar with the convenience of connecting your devices to Wi-Fi networks once, and if you allow your device to &#8220;remember&#8221; the network names, your device can automatically reconnect to any networks with those names from then on. </span></p>
<h3><span data-preserver-spaces="true">The Risk: When Convenience Becomes a Liability</span></h3>
<p><span data-preserver-spaces="true">Imagine this: You&#8217;ve visited a coffee shop and connected your smartphone to their Wi-Fi network. Your device remembers this network to connect automatically next time. Seems harmless, right? Here&#8217;s where the risk creeps in.</span></p>
<p>Once you tell a device to automatically reconnect to a remembered network in range, your device will continuously send out &#8220;probes&#8221; or signals looking for that network, typically one to four times a minute and more often when other events can trigger a probe. A threat actor can set up a Wi-Fi access point with a common SSID name, such as &#8220;home.&#8221; And what if your device is configured to automatically connect to a network you trust named &#8220;home?&#8221; When your device, say your smartphone or laptop, is within range, it might automatically connect to this rogue Wi-Fi network without your knowledge.</p>
<h3><span data-preserver-spaces="true">The Trap: A Deceptive Doppelgänger</span></h3>
<p><span data-preserver-spaces="true">This rogue network, set up by the threat actor, is a doppelgänger of your trusted network but with nefarious purposes.</span></p>
<p><span data-preserver-spaces="true">Remember: Your device connects to the rogue access point <em>automatically</em> and often <em>without alerting you at all.</em> (see &#8220;what about passwords&#8221; below). This attack does not need you to make any mistakes to succeed, and it can happen without your knowledge.</span></p>
<p><span data-preserver-spaces="true">Ten common network names threat actors can use that will often lure devices from unsuspecting users to connect include:</span></p>
<ul>
<li><span data-preserver-spaces="true">xfinitywifi</span></li>
<li><span data-preserver-spaces="true">linksys</span></li>
<li><span data-preserver-spaces="true">Marriott_Guest</span></li>
<li><span data-preserver-spaces="true">Hyatt</span></li>
<li><span data-preserver-spaces="true">hhonors</span></li>
<li><span data-preserver-spaces="true">NETGEAR</span></li>
<li><span data-preserver-spaces="true">Guest</span></li>
<li><span data-preserver-spaces="true">dlink</span></li>
<li><span data-preserver-spaces="true">FreeWifi</span></li>
<li><span data-preserver-spaces="true">Home</span></li>
</ul>
<p><span data-preserver-spaces="true">To make it even easier to connect, there are commercially available devices that listen for the SSID name in a probe from an unsuspecting user&#8217;s device and then broadcast that name in an effort to capture the device&#8217;s connection. In that case, it doesn&#8217;t matter how unique your SSID is, an automated device can attempt to establish a connection without your knowledge. </span><span data-preserver-spaces="true">If you are technically minded, you can read the section at the bottom of this article for a detailed explanation of how probing works.</span></p>
<p><span data-preserver-spaces="true">Once connected, the attacker can intercept your device&#8217;s data. This interception could be called a “Man-in-the-Middle” attack. Thanks to encryption technology, the attacks are more complicated than they used to be, but they are still possible in some circumstances. If the attacker successfully establishes the Man-in-the-Middle connection, imagine sending confidential emails, accessing your company’s financial data, or even logging into your personal banking app, all while an unseen cybercriminal is potentially recording every keystroke and data transfer.</span></p>
<p><span data-preserver-spaces="true">Another serious concern is if threat actors know of undiscovered vulnerabilities that will allow them to hack into your device. This is one of the most important reasons to always apply security updates when they are released and always keep backups for the unlikely scenario of an update causing a problem on your device. Even if you applied all of your security updates, sometimes attackers know of ways to break in that haven&#8217;t been discovered by the device&#8217;s manufacturer, operating system producer, or app developer yet. Thus, there are no updates written. Bad actors can use tools to scan your device and exploit vulnerabilities quickly. Their ultimate goal would be to take control of, or pwn, your device. This isn&#8217;t always easy if you have all your updates in place, but it isn&#8217;t impossible either.</span></p>
<h3><span data-preserver-spaces="true">The Consequences: A Digital Pandora&#8217;s Box</span></h3>
<p><span data-preserver-spaces="true">The consequences from attackers successfully tricking your device into connecting to their rogue access point and exploiting vulnerabilities can range from private information exposure to significant breaches:</span></p>
<ol>
<li><strong><span data-preserver-spaces="true">Personal Data Theft</span></strong><span data-preserver-spaces="true">: Sensitive personal information can be stolen.</span></li>
<li><strong><span data-preserver-spaces="true">Corporate Espionage</span></strong><span data-preserver-spaces="true">: Confidential business information could be compromised.</span></li>
<li><strong><span data-preserver-spaces="true">Identity Theft</span></strong><span data-preserver-spaces="true">: Your digital identity could be used for fraudulent activities.</span></li>
<li><strong><span data-preserver-spaces="true">Network Infiltration</span></strong><span data-preserver-spaces="true">: Once a device is compromised, it can serve as a gateway to your business’s entire network.</span></li>
</ol>
<h3><span data-preserver-spaces="true">Prevention: Turning Awareness into Action</span></h3>
<p><span data-preserver-spaces="true">As executives, instructing your workers to implement security measures is crucial. Here are some actionable steps you can take in the Wi-Fi settings of your laptops, phones, and tablets:</span></p>
<ol>
<li><strong><span data-preserver-spaces="true">Forget Networks</span></strong><span data-preserver-spaces="true">: In your device&#8217;s Wi-Fi settings, examine the network names identified as &#8220;remembered&#8221; or &#8220;my networks.&#8221; Tell your device to ‘forget’ networks by removing them from the &#8216;my networks&#8217; list, except those you use frequently. Were any of the ten listed above remembered on your device? To establish the unauthorized connection, the threat actor would need to use the name of one of the networks you leave remembered or use the device mentioned above that responds to probes for names your device sends.</span></li>
<li><strong><span data-preserver-spaces="true">Avoid a False Sense of Security</span></strong><span data-preserver-spaces="true">: If your device has the &#8220;Ask to Join Networks&#8221; setting, read the fine print. The device will still join known network names without asking. The setting is usually more about asking before joining new or unknown networks, rather than known ones.</span></li>
<li><strong><span data-preserver-spaces="true">Turn off Wi-Fi When You Aren&#8217;t Using it</span></strong><span data-preserver-spaces="true">: To reduce your exposure dramatically, disable Wi-Fi when you are not using it. Your device will stop probing, stop listening for access points broadcasting their name, and won&#8217;t connect to any Wi-Fi networks. Some devices have a quick shortcut to turn off Wi-Fi from an easily accessible menu, but they might turn Wi-Fi back on again after a while or when you move to a new location. On those devices, if you go into &#8220;Settings&#8221; to disable Wi-Fi, it should stay off until you manually change the setting to &#8220;on&#8221; again.</span></li>
</ol>
<h3><span data-preserver-spaces="true">What about Wireless Passwords?</span></h3>
<p><span data-preserver-spaces="true">If the original remembered network you connected to, such as the coffee shop network, had no password, your device would join the network automatically and not alert you. This is a common risk with some remembered networks. You may have noticed that many hotels and some coffee shops and restaurants now require no Wi-Fi password; this is undoubtedly to reduce guest frustration and the number of calls from hotel rooms to the front desk asking for the password. The prevalence of public networks without passwords makes it especially important for you to tell your device to forget networks and be sure to forget the ones with no passwords. </span></p>
<p><span data-preserver-spaces="true">However, if the &#8220;remembered&#8221; network did have a password, then to get your device to connect automatically without warning you, the threat actor will need to set the same password on the rogue access point. It is simple for an attacker to know the password for coffee shops and other networks that share the password with guests. </span></p>
<p><span data-preserver-spaces="true">Many companies will set passwords on networks and hopefully don&#8217;t write the password on dry-erase boards in the meeting room. Even if the passwords are configured at the company, and users do not know the password since the IT Professionals configure their computers, if an attacker is able to access one computer, in-person or remotely, there is a chance they can run a script to find out the wireless password for the company. This is why some companies use enterprise-level Wi-Fi authentication that does not rely on a shared password.  Or, attackers can use social engineering to successfully trick a user into providing the network password. If a user&#8217;s device doesn&#8217;t detect any anomalies between the rogue access point and the access point it is used to connecting to, the user will not be alerted they are connecting to a rogue access point, and their device will connect automatically.<br />
</span></p>
<p><span data-preserver-spaces="true">An exception that might generate an alert is when there is a discrepancy between the security settings of the known network and the one to which the device is trying to connect. An example is when the rogue access point does not have a password, but the remembered network does. In this case, some devices will prompt you: &#8220;Are you sure you want to join this network?&#8221; The default button, &#8220;join,&#8221; is preselected. Unless you are on the lookout for this kind of message and know the seriousness, you might click &#8220;join&#8221; and not think anything of it. Sometimes, the device will connect and not alert the user but will quietly list the word “open” or “insecure” under the network name on the list of networks under settings. Most people do not periodically look at the Wi-Fi settings, so the label often goes unnoticed. Even if a user does notice the label, there is a good chance the attacker already probed for weaknesses and exploited any vulnerabilities they discovered.</span></p>
<p>However, if you ever see a prompt asking you to re-enter a password, that is a huge red flag, and you need to assess the situation carefully to determine if your device is attempting to connect to a rogue access point with an inaccurate password.</p>
<p><span data-preserver-spaces="true">And to be sure you don’t have a false sense of security, remember that devices do not prompt the user if the security settings of the new network match those of the remembered network, and the device will quietly automatically connect even if it’s a rogue access point.</span></p>
<h3><span data-preserver-spaces="true">What about a VPN?</span></h3>
<p>A Virtual Private Network (VPN) is a technology that encrypts data as it moves to and from your device. This encryption can prevent attackers from reading your data. However, it&#8217;s important to note that a VPN doesn&#8217;t protect you from attackers who scan for unpatched vulnerabilities, search for open ports, and exploit weaknesses on your device. Even if you use a VPN, you&#8217;re still vulnerable to such attacks. Follow the instructions above to help ensure your online safety.</p>
<h3><span data-preserver-spaces="true">Final Thoughts: Balancing Convenience with Caution</span></h3>
<p><span data-preserver-spaces="true">In today&#8217;s fast-paced digital world, convenience often beats caution. However, in the realm of cybersecurity, this trade-off can have dire consequences. As leaders, our role extends beyond making decisions; it includes understanding and mitigating the risks associated with the technology we use every day. Stay safe, stay informed, and lead your organization confidently in this digital age.</span></p>
<h3><span data-preserver-spaces="true">Technical Details About the Probing Process</span></h3>
<p>For the more technically minded, here is more information about the probing process. When we say that devices are constantly probing, they are, and the probing might be once every 15 to 60 seconds. The probing frequency can vary, for example, if you put your device in low battery mode.</p>
<p>In addition to devices probing, know that Wi-Fi access points, including rogue access points attackers use, broadcast their network name, a process called beaconing, sometimes as often as ten times every second. The rate of beaconing is usually configurable by your IT Professionals.</p>
<p>If you look at “available networks” in &#8220;settings&#8221; on your device, you might notice that the list takes a few seconds to build because your device is cycling through multiple Wi-Fi frequencies, listening for the beacons.</p>
<p>An interesting setting not everyone is familiar with on wireless access points is that you can instruct the access point to be “hidden.” If you do, then the access point will not send out beacons. However, hidden networks, while not broadcasting their SSID, will still respond to direct probes that contain their SSID name. So, as soon as your device sends out a probe looking for the remembered hidden network, which it does regularly, as described above, the access point will respond, and your device will connect. Just because a network you “remembered” is hidden at your home or office doesn’t affect a threat actor’s ability to lure your device into connecting to their rogue access point, even if the hacker’s access point is not hidden.</p>
<p>Additionally, to reduce the delay in connecting, your device will send immediate probes in certain circumstances, such as when it wakes from sleep, when you open your laptop&#8217;s lid, or if you just disabled airplane mode. Your device will quickly find access points, even rogue ones, especially if they are &#8220;remembered.&#8221;</p>
<p>A significant benefit to attackers of your device probing periodically, such as every 15 to 60 seconds, is when the attacker doesn&#8217;t already know the network names your device has remembered. The attacker tools wait for the probe, then know the name, and the rogue access point automatically claims to have that network’s name. This is a very powerful way for attackers to capture as many unsuspecting users as possible without needing to predict the names of remembered networks.</p>
<p>&nbsp;</p>
<p><strong>Subscribe</strong> to maximize your executive potential with Foster Institute’s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h6>Disclaimer: The information provided in this blog is for general informational purposes only. Technology changes constantly, and some of this information might become obsolete or incorrect. We do not endorse or receive compensation for mentioning products, services, or brand names. Any outbound links provided are for your convenience and to get you started, but we cannot guarantee the security or safety of those external websites. Conducting your research and making an informed decision about any products or services mentioned here is essential. We shall not be held responsible for any actions taken based on the information provided.</h6>
<p>The post <a href="https://fosterinstitute.com/outsmarting-the-invisible-threat-how-cyber-attackers-hijack-your-wi-fi-connections/">Outsmarting the Invisible Threat: How Cyber Attackers Hijack Your Wi-Fi Connections and How to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>5 Things to Love about Apple</title>
		<link>https://fosterinstitute.com/5-things-to-love-about-apple/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 19 Dec 2013 06:00:53 +0000</pubDate>
				<category><![CDATA[Customer Service]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[surface pro]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[apple]]></category>
		<category><![CDATA[macbook]]></category>
		<category><![CDATA[recommendations]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1763</guid>

					<description><![CDATA[<p>Apple has a lot of great things going for it. Here are 5 of the biggest ones: 1. Apple Stores! Isn’t it so neat that someone can walk into a store, experiment with the products, have workers who are very familiar with the products, and – if you decide to – you can buy a [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/5-things-to-love-about-apple/">5 Things to Love about Apple</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Apple has a lot of great things going for it. Here are 5 of the biggest ones:<span id="more-1763"></span></p>
<p>1.  Apple Stores!  Isn’t it so neat that someone can walk into a store, experiment with the products, have workers who are very familiar with the products, and – if you decide to – you can buy a device right then and there.</p>
<p>2. Apples have a “cool” factor that is tough (though perhaps not impossible) to match. And many Apple users know how cool it is.</p>
<p>My wife phoned me immediately after last week’s newsletter, about Apple computers not having touchscreens, and announced, “You were way too harsh about Apple this time!”<br />
“But Honey,” I explained, “We get the most responses on the blogs when I’m controversial about Apple.” She replied, “There is a difference between being controversial and adversarial!”</p>
<p>As usual, she is right. My wife said to tell you about her Apple Tattoo. That was a surprise to me too. </p>
<p>I do enjoy Apple, own and use two MacBook Airs that are a big part of every week for work. On the road, I carry two Airs and one Surface.  I do use the Surface the most but don’t make up your mind until you’ve tried them both.</p>
<p>Bottom line: I respect Apple and enjoy their products. In fact, in many cases working with top level executives, I recommend to them the Apple (especially the Air) after finding out what their wants and needs are. Some dearest friends, and my lovely wife, are total Mac people too.</p>
<p>3. Apple’s “No-questions asked” 14 day return policy. Where else can you go buy a piece of hardware that you can use, including reloading the operating system with a new one such as Windows, connect every peripheral imaginable to test compatibility, and then can return it if it doesn’t suit your needs? After 14 productive days, you are likely to ask yourself how you ever lived without it. Or not. Isn’t it great for you to be able to find out? </p>
<p>4. Apple is a leader in the marketplace. Not just by selling so much hardware, but in the past, they’ve been “first to market” with features that none of their competitors had even thought of yet. Often, Apple defines the cutting edge. Though there is controversy, many Apple fans will tell you how the Macintosh was the first computer to even have a mouse – and then everyone else copied Apple.</p>
<p>5. Apple products actually work when you get them out of the box. Even “first releases.” Thank goodness, users of Windows products can now enjoy the same experience, but Apple was the first. Apple has the longest running record. Having confidence in the products you purchase is a huge buying factor for most people. </p>
<p>Keep an eye out: Next week will be the 5 more of 10 things to love about Apple.</p>
<p>The post <a href="https://fosterinstitute.com/5-things-to-love-about-apple/">5 Things to Love about Apple</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Apple is Silly for Not Offering Touch Screens</title>
		<link>https://fosterinstitute.com/apple-is-idiotic-for-not-offering-touch-screens/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 13 Dec 2013 17:20:49 +0000</pubDate>
				<category><![CDATA[Best Practices]]></category>
		<category><![CDATA[laptops]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1754</guid>

					<description><![CDATA[<p>Here is something I don&#8217;t understand: Apple still doesn&#8217;t have touch screen monitors! I&#8217;ve owned three MacBook Air computers and have loved them all. I bought the Airs because they are compact to carry, are very powerful, lightweight, durable, and really nice looking. Apple iPhones and iPads have touch screens that we all love. We’ve [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/apple-is-idiotic-for-not-offering-touch-screens/">Apple is Silly for Not Offering Touch Screens</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Here is something I don&#8217;t understand: Apple still doesn&#8217;t have touch screen monitors!</p>
<p>I&#8217;ve owned three MacBook Air computers and have loved them all. I bought the Airs because they are compact to carry, are very powerful, lightweight, durable, and really nice looking. </p>
<p>Apple iPhones and iPads have touch screens that we all love. We’ve become a touch-centric world, and Apple has driven that transition perhaps more than anyone.</p>
<p>The post <a href="https://fosterinstitute.com/apple-is-idiotic-for-not-offering-touch-screens/">Apple is Silly for Not Offering Touch Screens</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Special Computer Buying Guide</title>
		<link>https://fosterinstitute.com/special-computer-buying-guide/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 13 Dec 2013 10:05:13 +0000</pubDate>
				<category><![CDATA[laptops]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[surface pro]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[touch screen]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=1757</guid>

					<description><![CDATA[<p>Many executives have been asking what to look for in computers for their home use, and as gifts to loved ones. There aren’t that many shopping days left… So this newsletter is an “extra bonus” for you who still plan to search for a new computer. If you don’t want to click on the “for [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/special-computer-buying-guide/">Special Computer Buying Guide</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many executives have been asking what to look for in computers for their home use, and as gifts to loved ones. There aren’t that many shopping days left…<span id="more-1757"></span></p>
<p>So this newsletter is an “extra bonus” for you who still plan to search for a new computer. If you don’t want to click on the “for more information” links, it is ok to just read the text since you’ll still get what you need to know.</p>
<p>FORM FACTOR: Unless you are sure the user will only use a computer at a single desk and not benefit from moving around, buy a laptop. Laptops are fast, have excellent monitors, and some are very portable. </p>
<p>You can easily connect a world of peripherals at the office, at home, and any other “fixed location.” Using a “real keyboard,” mouse (for those monitors that aren’t touch enabled), printers, etc. is common at “desk” locations.  And being able “to be mobile” is essential for people who are on the move. As you plan to connect to those external devices, read &#8220;<a href="https://fosterinstitute.com/blog//docking-stations-are-dead/" title=" ">Docking Stations are Dead</a>&#8221;</p>
<p>You already know my affinity to the Microsoft Surface Pro which is a laptop and tablet combined: &#8220;<a href="https://fosterinstitute.com/blog//when-a-surface-pro-computer-is-better-than-an-ipad/" title=" ">When a Surface Pro Computer is Better than an iPad</a>&#8221; and &#8220;<a href="https://fosterinstitute.com/blog//ditch-the-ipad-and-get-the-surface-pro/" title=" ">Ditch the iPad and Get the Surface Pro?</a>&#8221; And many other manufacturers make beautiful convertible tablets with similar features to the Surface Pro. Shop around.</p>
<p>OPERATING SYSTEM: You’ll find Windows 8.1 installed on new computers – and that is a fine way to go.  Despite what you’ve heard, you can run Windows 8.1 in a way that looks a lot like Windows 7. See &#8220;<a href="https://fosterinstitute.com/blog//yes-windows-8-looks-like-windows-7/" title=" ">Yes, Windows 8 Looks like Windows 7</a>&#8221;</p>
<p>MONITOR: Get a Touch Screen – That’s where the world is going. If you will use the computer at a desk, then you need more than one monitor. Large monitors are inexpensive these days – get one of those. And, no, one large monitor is not a replacement for multiple small monitors. See &#8220;<a href="https://fosterinstitute.com/blog//monitors/" title=" ">Are Your Employees Still Using Single Monitors?</a>&#8221; for more information. This is a blog entry where a posting uses the word naked with multiple monitors in the same sentence: &#8220;<a href="https://fosterinstitute.com/blog//one-monitor/" title=" ">Still Using Just One Monitor?</a>&#8221; </p>
<p>You can connect multiple monitors to a laptop: &#8220;<a href="https://fosterinstitute.com/blog//multiple-monitors/" title=" ">How to Connect Multiple Monitors to Your Computer</a>&#8221; The only problem is that, so far, with multiple monitors only one of them can be used as your “touch screen” in Windows 8.1. The other monitors can support “touch screen,” but you have to choose which one to use as “touch.” </p>
<p>If you are buying for a “gamer” then you’ll want to max out on everything and maybe buy a specialized machine like those at <a href="http://www.falcon-nw.com/">Falcon Northwest</a> or <a href="http://www.ibuypower.com/">iBuyPower</a></p>
<p>RAM: For the rest of us, get a computer with at least 8G of RAM. If you think you’ll run many programs at once, or use memory hungry applications such as editing photos, then splurge on 16G of RAM.</p>
<p>DRIVE: Be sure that, unless you need to store an incredible amount of pictures, music, or movies, to get a solid state hard drive. Sometimes they are referred to as SSDs.  </p>
<p>Yes, there are times that “old” hard drives (HDDs) with moving parts are better than SSDs., They have less capacity and are more expensive per gigabyte than drives with moving parts, SSD drives are faster, use less electricity (your laptop’s battery will last longer), resist magnetism, and better resist movement (such as a computer being dropped or used on an aircraft or train with lots of vibrations).</p>
<p>A good strategy is to use a SSD in your computers, and use mirrored external USB 3.0 HDDs for backup.  Please contact me if that sentence makes no sense.</p>
<p>PROCESSOR: You needn’t go for the “top of the line” processor. They tend to be “priced extra high because some people will pay that much” and they use more power. Power saving is important in a laptop.</p>
<p>PRINTER: Be sure you get a printer that supports easy printing from your iPhone, Android, Windows Phone, and other devices.</p>
<p>MOUSE: For goodness sakes, get a mouse that is designed to be used “anywhere.” They work great on just about any mousing surface.</p>
<p>KEYBOARD: If you type a lot and don’t know about them, check out <a href="http://www.daskeyboard.com/">Das Keyboard</a></p>
<p>Please ask additional questions and/or post your advice below&#8230;</p>
<p>The post <a href="https://fosterinstitute.com/special-computer-buying-guide/">Special Computer Buying Guide</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
